- Sort Score
- Result 10 results
- Languages All
- Labels All
Results 261 - 270 of 663 for content_length:[500000 TO 999999] (1.17 sec)
-
Simple OAuth2 with Password and Bearer - FastAPI
fastapi.tiangolo.com/uk/tutorial/security/simple-oauth2/Registered: Fri Dec 12 07:18:49 UTC 2025 - 496.3K bytes - Viewed (0) -
OpenAPI models - FastAPI
fastapi.tiangolo.com/zh/reference/openapi/models/Registered: Fri Dec 12 06:09:35 UTC 2025 - 684.8K bytes - Viewed (0) -
Configure Access to Multiple Clusters | Kubernetes
This page shows how to configure access to multiple clusters by using configuration files. After your clusters, users, and contexts are defined in one or more configuration files, you can quickly switch between clusters by using the kubectl config use-context command. Note:A file that is used to configure access to a cluster is sometimes called a kubeconfig file. This is a generic way of referring to configuration files. It does not mean that there is a file named kubeconfig.kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/Registered: Fri Dec 12 08:40:51 UTC 2025 - 501.7K bytes - Viewed (0) -
Handling retriable and non-retriable pod failur...
FEATURE STATE: Kubernetes v1.31 [stable](enabled by default) This document shows you how to use the Pod failure policy, in combination with the default Pod backoff failure policy, to improve the control over the handling of container- or Pod-level failure within a Job. The definition of Pod failure policy may help you to: better utilize the computational resources by avoiding unnecessary Pod retries. avoid Job failures due to Pod disruptions (such preemption, API-initiated eviction or taint-based eviction).kubernetes.io/docs/tasks/job/pod-failure-policy/Registered: Fri Dec 12 08:41:35 UTC 2025 - 502.5K bytes - Viewed (0) -
Control Topology Management Policies on a node ...
FEATURE STATE: Kubernetes v1.27 [stable] An increasing number of systems leverage a combination of CPUs and hardware accelerators to support latency-critical execution and high-throughput parallel computation. These include workloads in fields such as telecommunications, scientific computing, machine learning, financial services and data analytics. Such hybrid systems comprise a high performance environment. In order to extract the best performance, optimizations related to CPU isolation, memory and device locality are required. However, in Kubernetes, these optimizations are handled by a disjoint set of components.kubernetes.io/docs/tasks/administer-cluster/topology-manager/Registered: Fri Dec 12 08:33:53 UTC 2025 - 489.9K bytes - Viewed (0) -
Projected Volumes | Kubernetes
This document describes projected volumes in Kubernetes. Familiarity with volumes is suggested. Introduction A projected volume maps several existing volume sources into the same directory. Currently, the following types of volume sources can be projected: secret downwardAPI configMap serviceAccountToken clusterTrustBundle podCertificate All sources are required to be in the same namespace as the Pod. For more details, see the all-in-one volume design document. Example configuration with a secret, a downwardAPI, and a configMap pods/storage/projected-secret-downwardapi-configmap.kubernetes.io/docs/concepts/storage/projected-volumes/Registered: Fri Dec 12 08:13:59 UTC 2025 - 505.8K bytes - Viewed (0) -
ReplicaSet | Kubernetes
A ReplicaSet's purpose is to maintain a stable set of replica Pods running at any given time. Usually, you define a Deployment and let that Deployment manage ReplicaSets automatically.kubernetes.io/docs/concepts/workloads/controllers/replicaset/Registered: Fri Dec 12 08:13:51 UTC 2025 - 501.3K bytes - Viewed (0) -
API Priority and Fairness | Kubernetes
FEATURE STATE: Kubernetes v1.29 [stable] Controlling the behavior of the Kubernetes API server in an overload situation is a key task for cluster administrators. The kube-apiserver has some controls available (i.e. the --max-requests-inflight and --max-mutating-requests-inflight command-line flags) to limit the amount of outstanding work that will be accepted, preventing a flood of inbound requests from overloading and potentially crashing the API server, but these flags are not enough to ensure that the most important requests get through in a period of high traffic.kubernetes.io/docs/concepts/cluster-administration/flow-control/Registered: Fri Dec 12 08:17:29 UTC 2025 - 518.4K bytes - Viewed (0) -
Secrets | Kubernetes
A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key. Such information might otherwise be put in a Pod specification or in a container image. Using a Secret means that you don't need to include confidential data in your application code. Because Secrets can be created independently of the Pods that use them, there is less risk of the Secret (and its data) being exposed during the workflow of creating, viewing, and editing Pods.kubernetes.io/docs/concepts/configuration/secret/Registered: Fri Dec 12 08:12:34 UTC 2025 - 531.5K bytes - Viewed (0) -
IPv4/IPv6 dual-stack | Kubernetes
Kubernetes lets you configure single-stack IPv4 networking, single-stack IPv6 networking, or dual stack networking with both network families active. This page explains how.kubernetes.io/docs/concepts/services-networking/dual-stack/Registered: Fri Dec 12 08:10:03 UTC 2025 - 497.6K bytes - Viewed (0)